信息网络安全 ›› 2018, Vol. 18 ›› Issue (10): 85-91.doi: 10.3969/j.issn.1671-1122.2018.10.012
收稿日期:
2018-07-02
出版日期:
2018-10-10
发布日期:
2020-05-11
作者简介:
作者简介:姜红(1971—),女,陕西,讲师,硕士,主要研究方向为电子商务、安全商务方案等;亢保元(1965—),男,陕西,教授,博士,主要研究方向为密码学、信息安全等;李春青(1962—),男,天津,教授,博士,主要研究方向为大数据处理、云计算安全等。
基金资助:
Hong JIANG1(), Baoyuan KANG2, Chunqing LI2
Received:
2018-07-02
Online:
2018-10-10
Published:
2020-05-11
摘要:
随着网络与信息技术的发展,云计算成了当今最热门的话题之一,云服务逐渐走进人们的生活,云服务商可以向数据用户提供数据存储和计算等服务。但是,在这种服务中必须有一个代表数据用户利益的第三方审计员定期验证用户外包数据的完整性。而且,在外包和审计过程中必须保护数据用户的身份和数据文件内容的安全。文章针对云共享数据完整性检测问题,利用数字签名技术和双线性对的性质,对两个保护用户身份的云共享数据完整性公开审计方案进行了改进,并在计算离散对数困难性问题假设下,对一个改进方案的安全性进行了证明。通过计算量和安全性比较,文章提出的改进方案有更严谨的安全性和相对小的计算成本。
中图分类号:
姜红, 亢保元, 李春青. 改进的保护身份的云共享数据完整性公开审计方案[J]. 信息网络安全, 2018, 18(10): 85-91.
Hong JIANG, Baoyuan KANG, Chunqing LI. Improved Auditing Schemes with Identity-preserving for the Integrity of Shared Data in the Cloud[J]. Netinfo Security, 2018, 18(10): 85-91.
[1] | ATENIESE G, BURNS R, CURTMOLA R, et al.Provable Data Possession at Untrusted Stores[C]//ACM. 14th ACM Conference on Computer and Communications Security, October 28-31, 2007, Alexandria, Virginia, USA. New York: ACM, 2007: 598-609. |
[2] | ATENIESE G, KAMARA S, KATZ J.Proofs of Storage from Homomorphic Identification Protocols[C]//ACM. 15th International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology, December 6-10, 2009, Tokyo, Japan. New York: ACM, 2009: 319-333. |
[3] | LU Rongxing, LIN Xiaodong, LUAN T H, et al.Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs[J]. IEEE Transactions on Vehicular Technology, 2012, 61(1) : 86-96. |
[4] | HOU Huiying, YU Jia, HAO Rong.Research on an Integrity Auditing Scheme Based on Algebraic Signature in Cloud Storage[J]. Netinfo Security, 2017, 17(10): 69-74. |
侯慧莹,于佳,郝蓉. 一种基于代数签名的云存储完整性审计方案研究[J]. 信息网络安全,2017,17(10):69-74. | |
[5] | WANG Qian, WANG Cong, REN Kui, et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847-859. |
[6] | YUAN Jiawei, YU Shucheng.Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(8): 1717-1726. |
[7] | ZENG Ke.Publicly Verifiable Remote Data Integrity[C]//Springer. 10th International Conference on Information and Communications Security, October 20-22, 2008, Birmingham, UK. Heidelberg: Springer, 2008: 419-434. |
[8] | ZHU Yan, HU Hongxin, AHN G J, et al.Cooperative Provable Data Possession for Integrity Verification in Multi-cloud Storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(12): 2231-2244. |
[9] | BIAN Genqing, SHAO Bilin, CAI Wandong, et al.Research on Multiple-replica Integrity Auditing Method on Supporting Data Dynamic Updating in Cloud Environment[J]. Netinfo Security, 2017, 17(10): 22-28. |
边根庆,必林,蔡皖东,等. 云环境下支持数据动态更新的多副本数据完整性审计方法研究[J]. 信息网络安全,2017,17(10):22-28. | |
[10] | XUE Liang, NI Jianbing, LI Yannan, et al. Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage[EB/OL]. . |
[11] | JIN Hao, ZHOU Ke, JIANG Hong, et al. Full Integrity and Freshness for Cloud Data[EB/OL]. . |
[12] | WANG Huaqun, WU Qianhong, QIN Bo, et al.Identity-based Remote Data Possession Checking in Public Clouds[J]. IET Information Security, 2014, 8(2): 114-121. |
[13] | ZHANG Jianhong, LI Pengyan.An Efficient Data Integrity Verification Scheme for Cloud Storage[J]. Netinfo Security, 2017, 17(3): 1-5. |
张键红,李鹏燕. 一种有效的云存储数据完整性验证方案[J]. 信息网络安全,2017,17(3):1-5. | |
[14] | YU Yong, XUE Liang, AU M H, et al.Cloud Data Integrity Checking with an Identity-based Auditing Mechanism from RSA[J]. Future Generation Computer Systems, 2016, 62(C): 85-91. |
[15] | WEI Lifei, ZHU Haojin, CAO Zhenfu, et al. Security and Privacy for Storage and Computation in Cloud Computing[EB/OL]. . |
[16] | WANG Cong, WANG Qian, REN Kui, et al.Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing[C]//IEEE. 2010 IEEE INFOCOM, March 14-19, 2010, San Diego, CA, USA. New Jersey: IEEE, 2010: 525-533. |
[17] | WORKU S, XU Chunxiang, ZHAO Jining, et al.Secure and Efficient Privacy-preserving Public Auditing Scheme[J]. Computer and Electrical Engineering, 2014, 40(5): 1703-1713. |
[18] | WANG Cong, CHOW S, WANG Qian, et al.Privacy-preserving Public Auditing for Secure Cloud Storage[J]. IEEE Transactions on computers, 2013, 62(2): 1-12. |
[19] | ZHANG Jianhong, ZHAO Xubing.Privacy-preserving Public Auditing Scheme for Shared Data with Supporting Multi-function[J]. Journal of Communication, 2015, 10(7): 535-542. |
[20] | LI Yannan, YU Yong, YANG Bo, et al. Privacy Preserving Cloud Auditing with Efficient Key Update[EB/OL]. . |
[21] | YANG Guangyang, YUA Jia, SHEN Wenting, et al.Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability[J]. Journal of Systems and Software, 2016, 113(C): 130-139. |
[22] | HE Kai, HUANG Chuanhe, YANG Kan, et al.Identity-preserving Public Auditing for Shared Cloud Data[C]//IEEE. 23rd International Symposium on Quality of Service, June 15-16, 2015, Portland, OR, USA. New Jersey: IEEE, 2015: 159-164. |
[1] | 刘渊, 乔巍. 云环境下基于Kubernetes集群系统的容器网络研究与优化[J]. 信息网络安全, 2020, 20(3): 36-44. |
[2] | 唐春明, 林旭慧. 隐私保护集合交集计算协议[J]. 信息网络安全, 2020, 20(1): 9-15. |
[3] | 张建航, 曹泽阳, 宋晓峰, 徐庆征. 抗量子本原格上高效的身份基消息恢复签名方案[J]. 信息网络安全, 2020, 20(1): 26-32. |
[4] | 白嘉萌, 寇英帅, 刘泽艺, 查达仁. 云计算平台基于角色的权限管理系统设计与实现[J]. 信息网络安全, 2020, 20(1): 75-82. |
[5] | 李晓冉, 郝蓉, 于佳. 具有数据上传管控的无证书可证明数据持有方案[J]. 信息网络安全, 2020, 20(1): 83-88. |
[6] | 汪金苗, 王国威, 王梅, 朱瑞瑾. 面向雾计算的隐私保护与访问控制方法[J]. 信息网络安全, 2019, 19(9): 41-45. |
[7] | 王生玉, 汪金苗, 董清风, 朱瑞瑾. 基于属性加密技术研究综述[J]. 信息网络安全, 2019, 19(9): 76-80. |
[8] | 任良钦, 王伟, 王琼霄, 鲁琳俪. 一种新型云密码计算平台架构及实现[J]. 信息网络安全, 2019, 19(9): 91-95. |
[9] | 余奕, 吕良双, 李肖坚, 王天博. 面向移动云计算场景的动态网络拓扑描述语言[J]. 信息网络安全, 2019, 19(9): 120-124. |
[10] | 王紫璇, 吕良双, 李肖坚, 王天博. 基于共享存储的OpenStack虚拟机应用分发策略[J]. 信息网络安全, 2019, 19(9): 125-129. |
[11] | 郝文江, 林云. 互联网企业社会责任现状与启示研究[J]. 信息网络安全, 2019, 19(9): 130-133. |
[12] | 韩益亮, 王众. 基于多变量和LRPC码的抗量子密码方案研究[J]. 信息网络安全, 2019, 19(8): 36-43. |
[13] | 张雪锋, 彭华. 一种基于SM9算法的盲签名方案研究[J]. 信息网络安全, 2019, 19(8): 61-67. |
[14] | 周权, 许舒美, 杨宁滨. 一种基于ABGS的智能电网隐私保护方案[J]. 信息网络安全, 2019, 19(7): 25-30. |
[15] | 崔艳鹏, 冯璐铭, 闫峥, 蔺华庆. 基于程序切片技术的云计算软件安全模型研究[J]. 信息网络安全, 2019, 19(7): 31-41. |
阅读次数 | ||||||||||||||||||||||||||||||||||||||||||||||||||
全文 78
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
摘要 431
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||